메뉴 건너뛰기




Volumn , Issue , 2010, Pages 113-120

Detecting malware variants via function-call graph similarity

Author keywords

[No Author keywords available]

Indexed keywords

ASSEMBLE CODES; CALL GRAPHS; CODE OBFUSCATION; FALSE POSITIVE RATES; GRAPH-MATCHING METHODS; HIGH LEVEL SEMANTICS; MALWARES; NOVEL ALGORITHM; S-FUNCTION; SPECIFIC INSTRUCTION;

EID: 78651389253     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2010.5665787     Document Type: Conference Paper
Times cited : (49)

References (23)
  • 1
    • 78651397644 scopus 로고    scopus 로고
    • Annual Report PandaLabs 2009, http://www.pandasecurity.com!homeusers/ security-info/tools/reports/.
    • (2009) Annual Report PandaLabs
  • 2
    • 76649141154 scopus 로고    scopus 로고
    • Automatic generation of string signatures for malware detection
    • Brittany, France, Sep.
    • K. Griffin, S. Schneider, X. Hu and T.-c. Chiueh. Automatic generation of string signatures for malware detection. In Proceedings of RAID 2009, pages 101-120, Brittany, France, Sep. 2009.
    • (2009) Proceedings of RAID 2009 , pp. 101-120
    • Griffin, K.1    Schneider, S.2    Hu, X.3    Chiueh, T.-C.4
  • 4
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • J. Marie, Borello and L. Mé. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, Volume 4, pages 211-220, 2008.
    • (2008) Journal in Computer Virology , vol.4 , pp. 211-220
    • Borello, J.M.1    Mé, L.2
  • 8
    • 54849442042 scopus 로고    scopus 로고
    • Constructing malware normalizers using term rewriting
    • Walenstein, R. Mathur, et al. Constructing malware normalizers using term rewriting. Journal in Computer Virology, Volume 4, pages 307-322, 2008.
    • (2008) Journal in Computer Virology , vol.4 , pp. 307-322
    • Walenstein, R.M.1
  • 14
    • 74049142314 scopus 로고    scopus 로고
    • Large-scale malware indexing using function-call graphs
    • Chicago, Illinois, USA
    • X. Hu, T.-c. Chiueh and K. G. Shin. Large-scale malware indexing using function-call graphs. In Proceedings of CCS 2009, pages 611-620, Chicago, Illinois, USA.
    • Proceedings of CCS 2009 , pp. 611-620
    • Hu, X.1    Chiueh, T.-C.2    Shin, K.G.3
  • 15
    • 78651394211 scopus 로고    scopus 로고
    • PeiD 0.95, http://www.peid.info/, 2010.
    • (2010) PeiD 0.95
  • 16
    • 78651400129 scopus 로고    scopus 로고
    • UPX 3.05, http://upx.sourceforge.net/, 2010.
    • (2010) UPX 3.05
  • 17
    • 78651400974 scopus 로고    scopus 로고
    • IDA Pro 5.5, http://www.hex-rays.comlidapro/, 2010.
    • (2010) IDA Pro 5.5
  • 19
    • 70350695504 scopus 로고    scopus 로고
    • No Starch Press, first edition, Aug.
    • Chris Eagle. The IDA Pro book, No Starch Press, first edition, Aug. 2008.
    • (2008) The IDA Pro Book
    • Eagle, C.1
  • 21
    • 78651403866 scopus 로고    scopus 로고
    • VX Heavens, http://vx.netlux.org/, 2010.
    • (2010)
  • 23
    • 78651401150 scopus 로고    scopus 로고
    • md5 checksum, http://www.etree.org/md5com.html, 2010.
    • (2010) md5 Checksum


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.